SlideShare uma empresa Scribd logo
1 de 11
Baixar para ler offline
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 54-64 © IAEME
54
AN INCREMENTAL TRUST-BASED METHOD FOR ROBUST POSITION
IDENTIFICATION IN WSNs
VINAY T.P1
, SANDHYA P.N2
1
(Assistant Professor, Department of ISE, Channabasaveshwara Institute of Technology,
Tumkur, India)
2
(Assistant Professor, Department of CSE, Channabasaveshwara Institute of Technology,
Tumkur, India)
ABSTRACT
In an Wireless Sensor Networks (WSNs) determining the location of sensors is a basic and
essential knowledge for most WSN algorithms. In this paper, we propose and discuss a technique
that aims to localize all the sensor nodes in the network using 2D trilateration and a security protocol
is used for providing confidentiality and authentication between locators nodes and sensor nodes.
Two issues about unknown nodes secure localization need to be considered. First, the attackers may
disguise as or attack the unknown and anchor nodes to interfere with localization process. Second,
the attackers may forge, replay or modify localization information to make the estimated positions
incorrect.
Keywords: Secure Localization, Verifiable Trilateration, Wireless Sensor Networks.
1. INTRODUCTION
Wireless sensor networks (WSNs) are envisioned to be widely used in medical, military, and
environmental monitoring applications. A future WSN might consist of hundreds to thousands of
deployed sensor nodes which are expected to self-organize into an autonomous network, perform
desired sensing tasks, and react properly to the environment or specific events. Localization is one of
the most important services provided by a WSN, because in most applications we are interested not
only in the types of events that have taken place, but also in where the events have taken place.
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 5, Issue 6, June (2014), pp. 54-64
© IAEME: www.iaeme.com/IJCET.asp
Journal Impact Factor (2014): 8.5328 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 54-64 © IAEME
55
2. RELATED WORK
WSN may be deployed in hostile environments where malicious adversaries attempt to spoof
the locations of the sensors by attacking the localization process[1]. For example, an attacker may
alter the distance estimations of a sensor to several reference points, or replay beacons from one part
of the network to some distant part of the network, thus providing false localization information.
Therefore, a secure positioning system must have a mechanism to verify the location claim of
any sensor. Some of the existing secure localization techniques are reviewed below.
2.1 SeRLoc
Lazos and Poovendran propose a novel scheme for localization of nodes in WSNs in
untrusted environments called SeRLoc. SeRLoc is a distributed, range-free, resource-efficient
localization technique in which there is no communication requirement between nodes for location
discovery[2]. SeRLoc is robust against sybil attacks, wormhole attacks and sensor compromise.
2.2 Attack Resistant Location Estimation
Liu, Ning, and Du put forward two range-based robust methods to tolerate malicious attacks
against beacon-based location discovery in sensor networks. The first method, attack-resistant
Minimum Mean Square Estimation, filters out malicious beacon signals. This is accomplished by
examining the inconsistency among location references of different beacon signals, indicated by the
mean square error of estimation, and beating malicious attacks by removing such malicious data. The
second method, voting-based location estimation quantizes the deployment field into a grid of cells
and has each location reference ‘vote’ on the cells in which the node may reside. This method
tolerates malicious beacon signals by adopting an iteratively refined voting scheme. Both methods
survive malicious attacks even if the attacks bypass authentication[5].
2.3 Robust Statistical Methods
Li, Trappe, Zhang, and Nath introduced the idea of being tolerant to attacks rather than trying
to eliminate them by exploiting redundancies at various levels within wireless networks[3].
2.4 SPINE
Capkun and Hubaux devise secure positioning in sensor networks (SPINE), a range-based
positioning system based on verifiable multilateration which enables secure computation and
verification of the positions of mobile devices in the presence of attackers. SPINE works by
bounding the distance of each sensor to at least three reference points[7].
2.5 DRBTS
DRBTS[8] is a distributed reputation and trust-based security protocol aimed at providing a
method for secure localization in sensor networks. In this model, incorrect location information
provided by malicious beacon nodes can be excluded during localization. This is achieved by
enabling beacon nodes to monitor each other and provide information so that sensor nodes can
choose who to trust, based on a majority voting approach. In order to trust beacon node’s
information, a sensor must get votes for its trustworthiness from at least half of their common
neighbors.
2.6 HiRLoc
Lazos and Poovendran propose a high-resolution, range independent localization technique
called HiRLoc. In HiRLoc, sensors passively determine their location without any interaction
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 54-64 © IAEME
56
amongst themselves. HiRLoc also eliminates the need for increased beacon node density and
specialized hardware. Table 1 illustrates the summary of security attacks addressed by each
algorithm.
TABLE 1: Summary of security attacks addressed by each algorithm
Algorithm
Localization Attacks
Distance
Fraud
MafiaFraud
Terrorist
Fraud
Wormhole
Sybil
Spoofing
Jamming
Over
shadowing
Manipulation
Replay
SeRLoc Yes No No Yes Yes Yes No No No No
Attack
Resistant
Location
Estimation
No No No No Yes Yes No No No No
DRBTS Yes No No Yes No Yes No No No No
HiRLoc Yes No No Yes Yes Yes No No No No
3. PROPOSED SYSTEM
An Incremental Trust based Robust Position Identification algorithm contains two phases.
First phase is location estimation in which the sensor node broadcast its ID to locators which comes
in sensor-to locator communication range and those locators perform distance bounding with sensor
node and included within the set LDBs[4]. Then for every locator of set LDBs, trust evaluation value
is estimated by sensor node. If the trust evaluation value is greater than or equal to threshold then it is
included within set LTs. If the number of locators within set LTs is greater than or equal to 3 and any
3 locators of set LTs forms an triangle around sensor, then location of sensor node is estimated
through Verifiable Trilateration. Otherwise localization fails. Second phase is location verification in
which location claim of sensor node is verified by locator through distance bounding protocol.
3.1 An Incremental Trust Based Robust Position Identification
Consider a two tier network which contains randomly deployed sensors to sense the
environment and randomly deployed locators which act as data collection points know their position
via manual configuration or a secure GPS system. The network assumptions are showed in Table 2.
Both sensors and locators perform nanosecond processing and measure time with nanosecond
precision, required for distance bounding[6]. It is assumed that sensor-to sensor communication
range equal to r. Locator-to locator communication range equal to R > r. Sensor-to locator
communication range equal to rsL which is computed as rsL = rG1/γ
, where G denotes the antenna
directivity gain of locators’ antenna and γ denotes the signal attenuation factor. It is assumed that
each sensor s shares a pair wise key K s
Li with each Li to perform cryptographic operations. The
locators which come in the power range are assumed as neighbors in trust evaluation. At least three
locators are required for performing Verifiable Trilateration.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 54-64 © IAEME
57
An Incremental Trust based Robust Position Identification algorithm contains two phases.
First phase is location estimation in which the sensor node broadcast its ID to locators which comes
in sensor-to locator communication range and those locators perform distance bounding with sensor
node and included within the set LDBs. Then for every locator of set LDBs, trust evaluation value is
estimated by sensor node. If the trust evaluation value is greater than or equal to threshold then it is
included within set LTs. If the number of locators within set LTs is greater than or equal to 3 and any
3 locators of set LTs forms an triangle around sensor, then location of sensor node is estimated
through Verifiable Trilateration[9]. Otherwise localization fails. Second phase is location verification
in which location claim of sensor node is verified by locator through distance bounding protocol.
Table 2 illustrates the network assumption.
TABLE 2: Network Assumptions
Sensors Locators
Area A A
Density ps pL << ps
Antenna Type Omni directional
M directional Antenna with beam
width
M
π2
3.2 Location Identification Phase
Step 1: The sensor s broadcasts its IDs to the locators. s : IDs
Step 2: Any locator Li which can communicate bi-directionally with sensor s performs distance
bounding with s. Distance bounding protocol verifies that sensor s being at a distance d sLi
from Li
cannot claim to be at a distance less than dsLi
LDBs = {Li : || Li – s || ≤ rsL } ...................... (1)
Step 3: For every locator Li which belongs to set LDBs, sensor node s collects the trust evaluation
value of locator Li as in trust model and checks whether the trust evaluation value of locator Li is
greater than or equal to threshold value. If the trust evaluation value of locator Li is greater than or
equal to threshold then the locator is added in the set LTs.
LTs = {Li: Li ∈ LDBs, T sLi
≥ Threshold} ................ (2)
Step 4: Sort the set LTs of locators in the order based on trust evaluation value of locators from high
to low.
Step 5: If | LTs | ≥ 3 then the sensor s performs Verifiable Trilateration with the locators Li ∈ LTs.
Otherwise the localization fails. Sensor s can perform Verifiable Trilateration if it is in the triangle of
three locators.
Step 6: If sensor s estimates its position by Verifiable Trilateration, then it notifies all the locators Li
∈ LDBs, with the transmission of computed position encrypted by the pair wise key and terminates
the algorithm.
Fig.1 shows the Algorithm for An Incremental Trust Based Robust Position Identification
Scheme
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 54-64 © IAEME
58
3.3 Location verification phase
Whenever a sensor node sends data along with the position to the locator, locator needs to
check the claimed position of sensor node. Hence, locator performs distance bounding with s. So, the
sensor cannot claim to be at a distance which is smaller than the actual one.
01: s: broadcast IDs
02: for all Li that receive broadcast from s
03: Li: perform Distance Bounding with s
04: s: define LDBs = { Li : || Li – s || ≤ rsL }
05: endfor
06: for all Li ‫א‬LDBs
07: s: compute Trust Evaluation Value of Li
08: s: define LTs = { Li : Li ‫א‬ LDBs, T sLi
≥ Threshold}
09: s: sort LTs such that
10: LTs = { Li: Li ∈ LTs, T sLi
≥ T sL 1i+
}
11: if (Li ,Lj, Lk) ∈ LTs such that
12: ∃ s inside ∆ Li Lj Lk
13: s: compute ŝ:= Verifiable Trilateration
14: s: notify EKs
Li
(Termination), ∀ Li ∈ LDBs
15: else
16: Localization fails
17: Endfor
Fig. 1: Algorithm for an Incremental Trust Based Robust Position Identification Scheme
4. SECURITY ANALYSIS
4.1 Attacker model
It is assumed that attacker can spoof the location estimated by the sensors. As a result sensors
try to estimate the position than the actual one. However, the attacker does not restrict sensors from
estimating the position. If the localization of sensor node fails, it is believed that it is under attack.
Also it is assumed that attacker is capable of jamming the signals of network entities. However,
jamming signals from all the entities results in failure of localization of the sensor node.
4.2 Wormhole attack
In wormhole attack an attacker receives packet at one point in the network, “tunnels” them to
alternative point in the network. In specified scheme, when the sensor node broadcasts IDs, the
attacker receives this information and tunnels this information to another point in the network and
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 54-64 © IAEME
59
replies from that point. Further, locators sends location information as reply, the attacker collects this
information and tunnels this to another point in the network and replies them.
It is assumed that a set of locators replied to the sensor s is under attack and s performs
Verifiable Trilateration with the three locators Li Lj Lk ∈ LTs such that s lies within ∆ Li Lj Lk. If the
attacker jams the signal from one locator, assume Li and replies as Li after some time, then s still
resides within ∆ Li Lj Lk. Suppose the distance from sensor node s to Li is enlarged then any one of the
other to locators need to reduce the distance. This is impossible due to distance bounding protocol.
Hence, the spoofing of position of s by attacker is not possible. If the attacker jams the signals from
all the locators of set LTs then localization fails.
4.3 Compromised node attack
A network entity is said to be compromised if attacker gains authority of all the information
related to the entity. Suppose if the attacker compromise the locators then it can jam the signals of
those locator which results in failure of localization if significant locators are compromised.
However, if the attacker adds bogus location information to the compromised locators, then this can
be detected by the trust model and those untrustworthy locators are not included in localization.
5. PERFORMANCE ANALYSIS
Case 1: Successful localization
In the case of successful localization there are 3 are more trustworthy locators are there
within the power range of given sensor node. And these trustworthy locators form a triangle around
the given sensor node. So the location of sensor node is computed using the 3 most trustworthy
locators which form triangle around sensor node.
Snapshot 1 shows the initial deployment of sensors and locators. There are 20 nodes in the
snapshot in which 8 nodes are locators, rest are sensor nodes. Sensor nodes are shown in green color
and locators are shown in blue color.
Snapshot 2 shows sensor node 11 is selected for localization. Node 11 is shown in red color
to indicate that this sensor node is selected for localization.
Snapshot 3 shows sensor node 11 broadcasting init message to locators which comes in the
power range of 11.The locators which receive broadcast from sensor node 11 are turned to pink
color.
Snapshot 4 shows the locators which receives broadcast of INIT message from sensor node
11. The locator which comes in sensor-to locator range of sensor node 11 receives this broadcast.
Locators which received broadcast from sensor node 11 are turned as pink, otherwise blue. Here
locators 6, 9, 12, 13, 15, 17 received broadcast from sensor node 11.
Snapshot 5 shows the locators which performed distance bounding with sensor node 11.
Locators which performed distance bounding with sensor node 11 is indicated in orange color, other
locators which are not involved in localization are turned as blue. Here the locators 9, 12, 13, 15, 17
are performing distance bounding with sensor node 11.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 54-64 © IAEME
60
Snapshot 6 shows locators passed in in trust evaluation by sensor node 11. The locator which
passed in trust evaluation are shown in purple color. Rest of the locators which are not invovled in
localization are shown in blue color.Here the trusted locators are 9, 12, 13, 15, and 17.
Since sensor node 11 is within the triangle formed by trusted locators, it is localized and it is
shown in yellow color in the snapshot 7.
Snapshot 1 Snapshot 2 Snapshot 3
Snapshot 4 Snapshot 5 Snapshot 6
Snapshot 7
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 54-64 © IAEME
61
Locators = {0, 6, 17, 15, 13, 12, 9, 1}
Enter the sensor to be localized: 11
Transmitting INIT Message to locators
Locators in the set LDBs = {17, 15, 13, 12, 9}
Locators in the set LTs = {17, 15, 13, 12, 9}
Verifiable Trilateration computed coordinates for Node 11 is : 375.935, 260.499
Case 2: Unsuccessful localization due to less number of locators in the set LTs.
In the case of unsuccessful localization due to less number of locators in the set LTs, there are
not sufficient trustworthy locators are there to form a triangle around the sensor node. Hence
localization fails.
Snapshot 8 shows sensor node 7 is selected for localization. Node 7 is shown in red color to
indicate that this sensor node is selected for localization.
Snapshot 9 shows sensor node 7 broadcasting init messages to locators which comes in the
power range of 7.The locators which receive broadcast from sensor node 7 are turned to pink color.
Snapshot 10 shows the locators which receives broadcast of INIT message from sensor node
7. The locator which comes in sensor-to locator range of sensor node 7 receives this broadcast.
Locators which received broadcast from sensor node 7 are turned as pink, otherwise blue. Here
locators 0, 1, 6, 9, 13 received broadcast from sensor node 7.
Snapshot 11 shows the locators which performed distance bounding with sensor node 7.
Locators which performed distance bounding with sensor node 7 is indicated in orange color, other
locators which are not involved in localization are turned as blue. Here the locators 0, 1, 6, 9, 13 are
performing distance bounding with sensor node 7.
Snapshot 12 shows locators passed in trust evaluation by sensor node 7. The locator which
passed in trust evaluation are shown in purple color. Rest of the locators which are not invovled in
localization are shown in blue color.Here the trusted locators is 0.
Snapshot 13 shows sensor node 7 which fails to localize. Since there is only one trusted
locator Verifiable Trilateration cannot be performed, localization fails.
Snapshot 8 Snapshot 9 Snapshot 10
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 54-64 © IAEME
62
Snapshot 11 Snapshot 12 Snapshot 13
Locators = {0, 6, 17, 15, 13, 12, 9, 1}
Enter the sensor to be localized: 7
Transmitting INIT Message to locators
Locators in the set LDBs = {0, 1, 6, 13, 9}
Locators in the set LTs = {0}
Localization fails.
Case 3: Unsuccessful localization due to failure of Verifiable Trilateration.
In the case of unsuccessful localization due to failure of Verifiable Trilateration, even though
there are sufficient trustworthy locators are there any 3 locators of those trustworthy locators does
not form triangle around the sensor node. Hence localization fails.
6. RESULTS
Simulation parameters are as follows. 20 sensor nodes are randomly placed within the square
area of size 500*500 and locators are randomly placed with varying number. Threshold is set to 0.7.
Fig.2 shows the percentage of trusted locators a sensor can get vs. number of locators for
varying G. Since the trust evaluation depends on G, as the G and number of locators increases, the
percentage of trusted locators also increases.
Fig. 2: Percentage of trusted locators a sensor can get vs. number of locators for varying G
0
10
20
30
40
50
60
70
80
0 5 10 15 20
Percentageoftrustedlocators
aroundasensornode
Number of locators
omni
G=2
G=3
G=4
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 54-64 © IAEME
63
Fig.3 shows the probability, that a sensor can perform Verifiable Trilateration vs. |LTs|. Since
the sensor is included within more than one triangle of locators. The probability of performing
Verifiable Trilateration increases as the number of locators increases.
Fig. 3: Probability, that a sensor can perform Verifiable Trilateration vs. |LTs|
Fig.4 shows percentage of sensors localized vs. number of locators for varying G. The
percentage of sensors localized increases as the number of locators increases. As G increases the
sensor- to locator range also increases. As a result more locators are included in localization process
hence the percentage of sensor getting localized also increases.
Fig. 4: Percentage of sensors localized vs. number of locators for varying G
7. CONCLUSION
Here we proposes a secure localization scheme by modifying Robust Position Estimation
algorithm, which provides more security than the existing one. WSN localization is used to estimate
the locations of the sensors with initially unknown positions in a network using the available priori
knowledge of positions of a few specific sensors in the network. In this work distance bounding
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
0 2 4 6 8 10 12 14 16 18 20
ProbabilityofperformingVerifiable
Trilateration
|LTs|
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
0 5 10 15 20
Percentageofsensorslocalized
Number of locators
Omni
G=2
G=3
G=4
G=5
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 54-64 © IAEME
64
protocol is used find the distance enlargement attack, and trust model is employed to rule out the
untrustworthy locators.
And finally Verifiable Trilateration scheme is used to compute the position of the sensor
node in which any three locators which form a triangle around sensor node are selected for
localization process. Verifiable Trilateration and Distance Bounding protocol together resist
wormhole attack and trust model helps to reduce the impact of compromised network entities. In
order to compute the position of the sensor node successfully at least three locators are needed and
any three trusted locators should form triangle around the sensor node.
REFERENCES
Proceedings Papers
[1] S. Brands and D. Chaum, Distance-bounding protocols, In Workshop on the theory and
application of cryptographic techniques on Advances in cryptology, pp. 344-359. Springer-
Verlag New York, Inc., 1994.
[2] L. Lazos and R. Poovendran, SeRLoc: Secure Range-Independent Localization for Wireless
Sensor Networks, in Proceedings of WISE, Philadelphia, PA, Oct. 2004, pp. 21–30.
[3] T. He, C. Huang, B. Blum, J. Stankovic and T. Abdelzaher, Range- Free Localization
Schemes in Large Scale Sensor Network, In Proceedings of MOBICOM, San Diego, CA,
USA, Sepultrat. 2003, pp. 81–95.
[4] N. Priyantha, A. Chakraborthy and H. Balakrishnan, The Cricket Location-Support System,
In Proceedings of MOBICOM, Boston, MA, USA, Aug. 2000, pp. 32-43.
Books
[5] D. Stinson, Cryptograhpy: Theory and Practice, 2nd edition, CRC Press, Boca Raton, FL,
2002.
[6] N. Cressie, Statistics for Spatial Data, John Wiley & Sons, 1993.
Conferences
[7] D. Liu, P. Ning, and W. Du. Detecting Malicious Beacon Nodes for Secure Location
Discovery in Wireless Sensor Networks. 25th IEEE International Conference on Distributed
Computing Systems (ICDCS ’05), pp. 609-619, 2005.
[8] D. Liu, P. Ning, W. Du. Attack-Resistant Location Estimation in Sensor Networks. In
Proceedings of The Fourth International Conference on Information Processing in Sensor
Networks (IPSN ’05), pages 99-106, April 2005.
[9] R.J. Fontana, E. Richley, and J. Barney, Commercialization of an F Precision Asset Location
System. In Proceedings of IEEE Conference on Ultra Wideband Systems and Technologies,
Nov. 2003.

Mais conteúdo relacionado

Mais procurados

A privacy preserving-location_monitoring_system_for_wireless_sensor_networks
A privacy preserving-location_monitoring_system_for_wireless_sensor_networksA privacy preserving-location_monitoring_system_for_wireless_sensor_networks
A privacy preserving-location_monitoring_system_for_wireless_sensor_networkssamah72
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksresearcherchennai
 
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor NetworksA Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networksambitlick
 
Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...prjpublications
 
Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...eSAT Publishing House
 
An enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsnAn enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsneSAT Publishing House
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Mumbai Academisc
 
A030101001006
A030101001006A030101001006
A030101001006theijes
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkRamesh Patriotic
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Rahul Kumar
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkMalicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkCSCJournals
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...eSAT Journals
 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...ijfcstjournal
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksIntrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksHarshal Ladhe
 
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...ieijjournal
 

Mais procurados (18)

A privacy preserving-location_monitoring_system_for_wireless_sensor_networks
A privacy preserving-location_monitoring_system_for_wireless_sensor_networksA privacy preserving-location_monitoring_system_for_wireless_sensor_networks
A privacy preserving-location_monitoring_system_for_wireless_sensor_networks
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor NetworksA Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
 
Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...
 
Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...
 
An enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsnAn enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsn
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
 
A030101001006
A030101001006A030101001006
A030101001006
 
C0511318
C0511318C0511318
C0511318
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor network
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkMalicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...
 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksIntrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
 
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
 

Destaque (9)

Sky Residencial
Sky ResidencialSky Residencial
Sky Residencial
 
Kaspersky case
Kaspersky caseKaspersky case
Kaspersky case
 
Vacaciones de veranoalexispacheco
Vacaciones de veranoalexispachecoVacaciones de veranoalexispacheco
Vacaciones de veranoalexispacheco
 
20120140506016
2012014050601620120140506016
20120140506016
 
Reforma fiscal 2014: impacto no regime fiscal da Madeira
Reforma fiscal 2014: impacto no regime fiscal da MadeiraReforma fiscal 2014: impacto no regime fiscal da Madeira
Reforma fiscal 2014: impacto no regime fiscal da Madeira
 
Mais Maracanã
Mais MaracanãMais Maracanã
Mais Maracanã
 
Oxymat 61 o2 analyzer
Oxymat 61  o2 analyzerOxymat 61  o2 analyzer
Oxymat 61 o2 analyzer
 
Pampulha a ilha da modernidade - TIDIR 3
Pampulha a ilha da modernidade - TIDIR 3Pampulha a ilha da modernidade - TIDIR 3
Pampulha a ilha da modernidade - TIDIR 3
 
Grayscale
GrayscaleGrayscale
Grayscale
 

Semelhante a 50120140506007 2

A Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor NetworksA Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor Networksijtsrd
 
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKSCONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKSpharmaindexing
 
Range Free Localization using Expected Hop Progress in Wireless Sensor Network
Range Free Localization using Expected Hop Progress in Wireless Sensor NetworkRange Free Localization using Expected Hop Progress in Wireless Sensor Network
Range Free Localization using Expected Hop Progress in Wireless Sensor NetworkAM Publications
 
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...IRJET Journal
 
Real-Time Location Systems Security using Distance Bounding
Real-Time Location Systems Security using Distance BoundingReal-Time Location Systems Security using Distance Bounding
Real-Time Location Systems Security using Distance BoundingIJRES Journal
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor NetworksIOSR Journals
 
An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...
An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...
An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...Acad
 
Detection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A SurveyDetection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A SurveyIOSR Journals
 
Effective range free localization scheme for wireless sensor network
Effective range  free localization scheme for wireless sensor networkEffective range  free localization scheme for wireless sensor network
Effective range free localization scheme for wireless sensor networkijmnct
 
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor NetworksA New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor Networksidescitation
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksijdpsjournal
 
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...ijasuc
 
IOT-WSN: SURVEY ON POSITIONING TECHNIQUES
IOT-WSN: SURVEY ON POSITIONING TECHNIQUESIOT-WSN: SURVEY ON POSITIONING TECHNIQUES
IOT-WSN: SURVEY ON POSITIONING TECHNIQUESijassn
 

Semelhante a 50120140506007 2 (20)

O010528791
O010528791O010528791
O010528791
 
A Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor NetworksA Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor Networks
 
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKSCONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
 
Range Free Localization using Expected Hop Progress in Wireless Sensor Network
Range Free Localization using Expected Hop Progress in Wireless Sensor NetworkRange Free Localization using Expected Hop Progress in Wireless Sensor Network
Range Free Localization using Expected Hop Progress in Wireless Sensor Network
 
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
IRJET- A Privacy-Preserving Location Monitoring System for Wireless Sensor Ne...
 
Real-Time Location Systems Security using Distance Bounding
Real-Time Location Systems Security using Distance BoundingReal-Time Location Systems Security using Distance Bounding
Real-Time Location Systems Security using Distance Bounding
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks
 
An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...
An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...
An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...
 
Detection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A SurveyDetection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A Survey
 
P017129296
P017129296P017129296
P017129296
 
Bi24385389
Bi24385389Bi24385389
Bi24385389
 
Effective range free localization scheme for wireless sensor network
Effective range  free localization scheme for wireless sensor networkEffective range  free localization scheme for wireless sensor network
Effective range free localization scheme for wireless sensor network
 
O026084087
O026084087O026084087
O026084087
 
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor NetworksA New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
 
50120140503002
5012014050300250120140503002
50120140503002
 
3 ijcse-01222-5
3 ijcse-01222-53 ijcse-01222-5
3 ijcse-01222-5
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networks
 
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
 
IOT-WSN: SURVEY ON POSITIONING TECHNIQUES
IOT-WSN: SURVEY ON POSITIONING TECHNIQUESIOT-WSN: SURVEY ON POSITIONING TECHNIQUES
IOT-WSN: SURVEY ON POSITIONING TECHNIQUES
 
Coordinate Location Fingerprint Based On WiFi Service
Coordinate Location Fingerprint Based On  WiFi ServiceCoordinate Location Fingerprint Based On  WiFi Service
Coordinate Location Fingerprint Based On WiFi Service
 

Mais de IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mais de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Último

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 

Último (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 

50120140506007 2

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 54-64 © IAEME 54 AN INCREMENTAL TRUST-BASED METHOD FOR ROBUST POSITION IDENTIFICATION IN WSNs VINAY T.P1 , SANDHYA P.N2 1 (Assistant Professor, Department of ISE, Channabasaveshwara Institute of Technology, Tumkur, India) 2 (Assistant Professor, Department of CSE, Channabasaveshwara Institute of Technology, Tumkur, India) ABSTRACT In an Wireless Sensor Networks (WSNs) determining the location of sensors is a basic and essential knowledge for most WSN algorithms. In this paper, we propose and discuss a technique that aims to localize all the sensor nodes in the network using 2D trilateration and a security protocol is used for providing confidentiality and authentication between locators nodes and sensor nodes. Two issues about unknown nodes secure localization need to be considered. First, the attackers may disguise as or attack the unknown and anchor nodes to interfere with localization process. Second, the attackers may forge, replay or modify localization information to make the estimated positions incorrect. Keywords: Secure Localization, Verifiable Trilateration, Wireless Sensor Networks. 1. INTRODUCTION Wireless sensor networks (WSNs) are envisioned to be widely used in medical, military, and environmental monitoring applications. A future WSN might consist of hundreds to thousands of deployed sensor nodes which are expected to self-organize into an autonomous network, perform desired sensing tasks, and react properly to the environment or specific events. Localization is one of the most important services provided by a WSN, because in most applications we are interested not only in the types of events that have taken place, but also in where the events have taken place. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 6, June (2014), pp. 54-64 © IAEME: www.iaeme.com/IJCET.asp Journal Impact Factor (2014): 8.5328 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 54-64 © IAEME 55 2. RELATED WORK WSN may be deployed in hostile environments where malicious adversaries attempt to spoof the locations of the sensors by attacking the localization process[1]. For example, an attacker may alter the distance estimations of a sensor to several reference points, or replay beacons from one part of the network to some distant part of the network, thus providing false localization information. Therefore, a secure positioning system must have a mechanism to verify the location claim of any sensor. Some of the existing secure localization techniques are reviewed below. 2.1 SeRLoc Lazos and Poovendran propose a novel scheme for localization of nodes in WSNs in untrusted environments called SeRLoc. SeRLoc is a distributed, range-free, resource-efficient localization technique in which there is no communication requirement between nodes for location discovery[2]. SeRLoc is robust against sybil attacks, wormhole attacks and sensor compromise. 2.2 Attack Resistant Location Estimation Liu, Ning, and Du put forward two range-based robust methods to tolerate malicious attacks against beacon-based location discovery in sensor networks. The first method, attack-resistant Minimum Mean Square Estimation, filters out malicious beacon signals. This is accomplished by examining the inconsistency among location references of different beacon signals, indicated by the mean square error of estimation, and beating malicious attacks by removing such malicious data. The second method, voting-based location estimation quantizes the deployment field into a grid of cells and has each location reference ‘vote’ on the cells in which the node may reside. This method tolerates malicious beacon signals by adopting an iteratively refined voting scheme. Both methods survive malicious attacks even if the attacks bypass authentication[5]. 2.3 Robust Statistical Methods Li, Trappe, Zhang, and Nath introduced the idea of being tolerant to attacks rather than trying to eliminate them by exploiting redundancies at various levels within wireless networks[3]. 2.4 SPINE Capkun and Hubaux devise secure positioning in sensor networks (SPINE), a range-based positioning system based on verifiable multilateration which enables secure computation and verification of the positions of mobile devices in the presence of attackers. SPINE works by bounding the distance of each sensor to at least three reference points[7]. 2.5 DRBTS DRBTS[8] is a distributed reputation and trust-based security protocol aimed at providing a method for secure localization in sensor networks. In this model, incorrect location information provided by malicious beacon nodes can be excluded during localization. This is achieved by enabling beacon nodes to monitor each other and provide information so that sensor nodes can choose who to trust, based on a majority voting approach. In order to trust beacon node’s information, a sensor must get votes for its trustworthiness from at least half of their common neighbors. 2.6 HiRLoc Lazos and Poovendran propose a high-resolution, range independent localization technique called HiRLoc. In HiRLoc, sensors passively determine their location without any interaction
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 54-64 © IAEME 56 amongst themselves. HiRLoc also eliminates the need for increased beacon node density and specialized hardware. Table 1 illustrates the summary of security attacks addressed by each algorithm. TABLE 1: Summary of security attacks addressed by each algorithm Algorithm Localization Attacks Distance Fraud MafiaFraud Terrorist Fraud Wormhole Sybil Spoofing Jamming Over shadowing Manipulation Replay SeRLoc Yes No No Yes Yes Yes No No No No Attack Resistant Location Estimation No No No No Yes Yes No No No No DRBTS Yes No No Yes No Yes No No No No HiRLoc Yes No No Yes Yes Yes No No No No 3. PROPOSED SYSTEM An Incremental Trust based Robust Position Identification algorithm contains two phases. First phase is location estimation in which the sensor node broadcast its ID to locators which comes in sensor-to locator communication range and those locators perform distance bounding with sensor node and included within the set LDBs[4]. Then for every locator of set LDBs, trust evaluation value is estimated by sensor node. If the trust evaluation value is greater than or equal to threshold then it is included within set LTs. If the number of locators within set LTs is greater than or equal to 3 and any 3 locators of set LTs forms an triangle around sensor, then location of sensor node is estimated through Verifiable Trilateration. Otherwise localization fails. Second phase is location verification in which location claim of sensor node is verified by locator through distance bounding protocol. 3.1 An Incremental Trust Based Robust Position Identification Consider a two tier network which contains randomly deployed sensors to sense the environment and randomly deployed locators which act as data collection points know their position via manual configuration or a secure GPS system. The network assumptions are showed in Table 2. Both sensors and locators perform nanosecond processing and measure time with nanosecond precision, required for distance bounding[6]. It is assumed that sensor-to sensor communication range equal to r. Locator-to locator communication range equal to R > r. Sensor-to locator communication range equal to rsL which is computed as rsL = rG1/γ , where G denotes the antenna directivity gain of locators’ antenna and γ denotes the signal attenuation factor. It is assumed that each sensor s shares a pair wise key K s Li with each Li to perform cryptographic operations. The locators which come in the power range are assumed as neighbors in trust evaluation. At least three locators are required for performing Verifiable Trilateration.
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 54-64 © IAEME 57 An Incremental Trust based Robust Position Identification algorithm contains two phases. First phase is location estimation in which the sensor node broadcast its ID to locators which comes in sensor-to locator communication range and those locators perform distance bounding with sensor node and included within the set LDBs. Then for every locator of set LDBs, trust evaluation value is estimated by sensor node. If the trust evaluation value is greater than or equal to threshold then it is included within set LTs. If the number of locators within set LTs is greater than or equal to 3 and any 3 locators of set LTs forms an triangle around sensor, then location of sensor node is estimated through Verifiable Trilateration[9]. Otherwise localization fails. Second phase is location verification in which location claim of sensor node is verified by locator through distance bounding protocol. Table 2 illustrates the network assumption. TABLE 2: Network Assumptions Sensors Locators Area A A Density ps pL << ps Antenna Type Omni directional M directional Antenna with beam width M π2 3.2 Location Identification Phase Step 1: The sensor s broadcasts its IDs to the locators. s : IDs Step 2: Any locator Li which can communicate bi-directionally with sensor s performs distance bounding with s. Distance bounding protocol verifies that sensor s being at a distance d sLi from Li cannot claim to be at a distance less than dsLi LDBs = {Li : || Li – s || ≤ rsL } ...................... (1) Step 3: For every locator Li which belongs to set LDBs, sensor node s collects the trust evaluation value of locator Li as in trust model and checks whether the trust evaluation value of locator Li is greater than or equal to threshold value. If the trust evaluation value of locator Li is greater than or equal to threshold then the locator is added in the set LTs. LTs = {Li: Li ∈ LDBs, T sLi ≥ Threshold} ................ (2) Step 4: Sort the set LTs of locators in the order based on trust evaluation value of locators from high to low. Step 5: If | LTs | ≥ 3 then the sensor s performs Verifiable Trilateration with the locators Li ∈ LTs. Otherwise the localization fails. Sensor s can perform Verifiable Trilateration if it is in the triangle of three locators. Step 6: If sensor s estimates its position by Verifiable Trilateration, then it notifies all the locators Li ∈ LDBs, with the transmission of computed position encrypted by the pair wise key and terminates the algorithm. Fig.1 shows the Algorithm for An Incremental Trust Based Robust Position Identification Scheme
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 54-64 © IAEME 58 3.3 Location verification phase Whenever a sensor node sends data along with the position to the locator, locator needs to check the claimed position of sensor node. Hence, locator performs distance bounding with s. So, the sensor cannot claim to be at a distance which is smaller than the actual one. 01: s: broadcast IDs 02: for all Li that receive broadcast from s 03: Li: perform Distance Bounding with s 04: s: define LDBs = { Li : || Li – s || ≤ rsL } 05: endfor 06: for all Li ‫א‬LDBs 07: s: compute Trust Evaluation Value of Li 08: s: define LTs = { Li : Li ‫א‬ LDBs, T sLi ≥ Threshold} 09: s: sort LTs such that 10: LTs = { Li: Li ∈ LTs, T sLi ≥ T sL 1i+ } 11: if (Li ,Lj, Lk) ∈ LTs such that 12: ∃ s inside ∆ Li Lj Lk 13: s: compute ŝ:= Verifiable Trilateration 14: s: notify EKs Li (Termination), ∀ Li ∈ LDBs 15: else 16: Localization fails 17: Endfor Fig. 1: Algorithm for an Incremental Trust Based Robust Position Identification Scheme 4. SECURITY ANALYSIS 4.1 Attacker model It is assumed that attacker can spoof the location estimated by the sensors. As a result sensors try to estimate the position than the actual one. However, the attacker does not restrict sensors from estimating the position. If the localization of sensor node fails, it is believed that it is under attack. Also it is assumed that attacker is capable of jamming the signals of network entities. However, jamming signals from all the entities results in failure of localization of the sensor node. 4.2 Wormhole attack In wormhole attack an attacker receives packet at one point in the network, “tunnels” them to alternative point in the network. In specified scheme, when the sensor node broadcasts IDs, the attacker receives this information and tunnels this information to another point in the network and
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 54-64 © IAEME 59 replies from that point. Further, locators sends location information as reply, the attacker collects this information and tunnels this to another point in the network and replies them. It is assumed that a set of locators replied to the sensor s is under attack and s performs Verifiable Trilateration with the three locators Li Lj Lk ∈ LTs such that s lies within ∆ Li Lj Lk. If the attacker jams the signal from one locator, assume Li and replies as Li after some time, then s still resides within ∆ Li Lj Lk. Suppose the distance from sensor node s to Li is enlarged then any one of the other to locators need to reduce the distance. This is impossible due to distance bounding protocol. Hence, the spoofing of position of s by attacker is not possible. If the attacker jams the signals from all the locators of set LTs then localization fails. 4.3 Compromised node attack A network entity is said to be compromised if attacker gains authority of all the information related to the entity. Suppose if the attacker compromise the locators then it can jam the signals of those locator which results in failure of localization if significant locators are compromised. However, if the attacker adds bogus location information to the compromised locators, then this can be detected by the trust model and those untrustworthy locators are not included in localization. 5. PERFORMANCE ANALYSIS Case 1: Successful localization In the case of successful localization there are 3 are more trustworthy locators are there within the power range of given sensor node. And these trustworthy locators form a triangle around the given sensor node. So the location of sensor node is computed using the 3 most trustworthy locators which form triangle around sensor node. Snapshot 1 shows the initial deployment of sensors and locators. There are 20 nodes in the snapshot in which 8 nodes are locators, rest are sensor nodes. Sensor nodes are shown in green color and locators are shown in blue color. Snapshot 2 shows sensor node 11 is selected for localization. Node 11 is shown in red color to indicate that this sensor node is selected for localization. Snapshot 3 shows sensor node 11 broadcasting init message to locators which comes in the power range of 11.The locators which receive broadcast from sensor node 11 are turned to pink color. Snapshot 4 shows the locators which receives broadcast of INIT message from sensor node 11. The locator which comes in sensor-to locator range of sensor node 11 receives this broadcast. Locators which received broadcast from sensor node 11 are turned as pink, otherwise blue. Here locators 6, 9, 12, 13, 15, 17 received broadcast from sensor node 11. Snapshot 5 shows the locators which performed distance bounding with sensor node 11. Locators which performed distance bounding with sensor node 11 is indicated in orange color, other locators which are not involved in localization are turned as blue. Here the locators 9, 12, 13, 15, 17 are performing distance bounding with sensor node 11.
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 54-64 © IAEME 60 Snapshot 6 shows locators passed in in trust evaluation by sensor node 11. The locator which passed in trust evaluation are shown in purple color. Rest of the locators which are not invovled in localization are shown in blue color.Here the trusted locators are 9, 12, 13, 15, and 17. Since sensor node 11 is within the triangle formed by trusted locators, it is localized and it is shown in yellow color in the snapshot 7. Snapshot 1 Snapshot 2 Snapshot 3 Snapshot 4 Snapshot 5 Snapshot 6 Snapshot 7
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 54-64 © IAEME 61 Locators = {0, 6, 17, 15, 13, 12, 9, 1} Enter the sensor to be localized: 11 Transmitting INIT Message to locators Locators in the set LDBs = {17, 15, 13, 12, 9} Locators in the set LTs = {17, 15, 13, 12, 9} Verifiable Trilateration computed coordinates for Node 11 is : 375.935, 260.499 Case 2: Unsuccessful localization due to less number of locators in the set LTs. In the case of unsuccessful localization due to less number of locators in the set LTs, there are not sufficient trustworthy locators are there to form a triangle around the sensor node. Hence localization fails. Snapshot 8 shows sensor node 7 is selected for localization. Node 7 is shown in red color to indicate that this sensor node is selected for localization. Snapshot 9 shows sensor node 7 broadcasting init messages to locators which comes in the power range of 7.The locators which receive broadcast from sensor node 7 are turned to pink color. Snapshot 10 shows the locators which receives broadcast of INIT message from sensor node 7. The locator which comes in sensor-to locator range of sensor node 7 receives this broadcast. Locators which received broadcast from sensor node 7 are turned as pink, otherwise blue. Here locators 0, 1, 6, 9, 13 received broadcast from sensor node 7. Snapshot 11 shows the locators which performed distance bounding with sensor node 7. Locators which performed distance bounding with sensor node 7 is indicated in orange color, other locators which are not involved in localization are turned as blue. Here the locators 0, 1, 6, 9, 13 are performing distance bounding with sensor node 7. Snapshot 12 shows locators passed in trust evaluation by sensor node 7. The locator which passed in trust evaluation are shown in purple color. Rest of the locators which are not invovled in localization are shown in blue color.Here the trusted locators is 0. Snapshot 13 shows sensor node 7 which fails to localize. Since there is only one trusted locator Verifiable Trilateration cannot be performed, localization fails. Snapshot 8 Snapshot 9 Snapshot 10
  • 9. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 54-64 © IAEME 62 Snapshot 11 Snapshot 12 Snapshot 13 Locators = {0, 6, 17, 15, 13, 12, 9, 1} Enter the sensor to be localized: 7 Transmitting INIT Message to locators Locators in the set LDBs = {0, 1, 6, 13, 9} Locators in the set LTs = {0} Localization fails. Case 3: Unsuccessful localization due to failure of Verifiable Trilateration. In the case of unsuccessful localization due to failure of Verifiable Trilateration, even though there are sufficient trustworthy locators are there any 3 locators of those trustworthy locators does not form triangle around the sensor node. Hence localization fails. 6. RESULTS Simulation parameters are as follows. 20 sensor nodes are randomly placed within the square area of size 500*500 and locators are randomly placed with varying number. Threshold is set to 0.7. Fig.2 shows the percentage of trusted locators a sensor can get vs. number of locators for varying G. Since the trust evaluation depends on G, as the G and number of locators increases, the percentage of trusted locators also increases. Fig. 2: Percentage of trusted locators a sensor can get vs. number of locators for varying G 0 10 20 30 40 50 60 70 80 0 5 10 15 20 Percentageoftrustedlocators aroundasensornode Number of locators omni G=2 G=3 G=4
  • 10. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 54-64 © IAEME 63 Fig.3 shows the probability, that a sensor can perform Verifiable Trilateration vs. |LTs|. Since the sensor is included within more than one triangle of locators. The probability of performing Verifiable Trilateration increases as the number of locators increases. Fig. 3: Probability, that a sensor can perform Verifiable Trilateration vs. |LTs| Fig.4 shows percentage of sensors localized vs. number of locators for varying G. The percentage of sensors localized increases as the number of locators increases. As G increases the sensor- to locator range also increases. As a result more locators are included in localization process hence the percentage of sensor getting localized also increases. Fig. 4: Percentage of sensors localized vs. number of locators for varying G 7. CONCLUSION Here we proposes a secure localization scheme by modifying Robust Position Estimation algorithm, which provides more security than the existing one. WSN localization is used to estimate the locations of the sensors with initially unknown positions in a network using the available priori knowledge of positions of a few specific sensors in the network. In this work distance bounding 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 0 2 4 6 8 10 12 14 16 18 20 ProbabilityofperformingVerifiable Trilateration |LTs| 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 0 5 10 15 20 Percentageofsensorslocalized Number of locators Omni G=2 G=3 G=4 G=5
  • 11. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 6, June (2014), pp. 54-64 © IAEME 64 protocol is used find the distance enlargement attack, and trust model is employed to rule out the untrustworthy locators. And finally Verifiable Trilateration scheme is used to compute the position of the sensor node in which any three locators which form a triangle around sensor node are selected for localization process. Verifiable Trilateration and Distance Bounding protocol together resist wormhole attack and trust model helps to reduce the impact of compromised network entities. In order to compute the position of the sensor node successfully at least three locators are needed and any three trusted locators should form triangle around the sensor node. REFERENCES Proceedings Papers [1] S. Brands and D. Chaum, Distance-bounding protocols, In Workshop on the theory and application of cryptographic techniques on Advances in cryptology, pp. 344-359. Springer- Verlag New York, Inc., 1994. [2] L. Lazos and R. Poovendran, SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks, in Proceedings of WISE, Philadelphia, PA, Oct. 2004, pp. 21–30. [3] T. He, C. Huang, B. Blum, J. Stankovic and T. Abdelzaher, Range- Free Localization Schemes in Large Scale Sensor Network, In Proceedings of MOBICOM, San Diego, CA, USA, Sepultrat. 2003, pp. 81–95. [4] N. Priyantha, A. Chakraborthy and H. Balakrishnan, The Cricket Location-Support System, In Proceedings of MOBICOM, Boston, MA, USA, Aug. 2000, pp. 32-43. Books [5] D. Stinson, Cryptograhpy: Theory and Practice, 2nd edition, CRC Press, Boca Raton, FL, 2002. [6] N. Cressie, Statistics for Spatial Data, John Wiley & Sons, 1993. Conferences [7] D. Liu, P. Ning, and W. Du. Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks. 25th IEEE International Conference on Distributed Computing Systems (ICDCS ’05), pp. 609-619, 2005. [8] D. Liu, P. Ning, W. Du. Attack-Resistant Location Estimation in Sensor Networks. In Proceedings of The Fourth International Conference on Information Processing in Sensor Networks (IPSN ’05), pages 99-106, April 2005. [9] R.J. Fontana, E. Richley, and J. Barney, Commercialization of an F Precision Asset Location System. In Proceedings of IEEE Conference on Ultra Wideband Systems and Technologies, Nov. 2003.